CVE-2022-30746

7.5 HIGH

📋 TL;DR

This vulnerability in Samsung SmartThings allows attackers to remotely access sensitive information through a missing caller check in the JavaScript interface API. Attackers can exploit this flaw to retrieve private data from affected SmartThings devices. Users with SmartThings devices running vulnerable firmware versions are affected.

💻 Affected Systems

Products:
  • Samsung SmartThings Hub
  • SmartThings-compatible devices
Versions: All versions prior to 1.7.85.12
Operating Systems: SmartThings firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects SmartThings hubs and devices using the vulnerable JavaScript interface API. Cloud-connected SmartThings services may also be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SmartThings ecosystem, allowing attackers to access all connected devices, steal personal data, and potentially control smart home devices.

🟠

Likely Case

Unauthorized access to sensitive SmartThings data including device configurations, user information, and potentially connected account credentials.

🟢

If Mitigated

Limited exposure if proper network segmentation and access controls are implemented, restricting JavaScript interface access.

🌐 Internet-Facing: HIGH - The vulnerability allows remote exploitation through JavaScript interface, making internet-connected SmartThings hubs particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal network access could still allow exploitation, though requires some level of network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires JavaScript execution capability but no authentication. The missing caller check makes exploitation straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.85.12 and later

Vendor Advisory: https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=6

Restart Required: Yes

Instructions:

1. Open SmartThings app 2. Go to Settings 3. Select 'About SmartThings Hub' 4. Check for firmware updates 5. Install version 1.7.85.12 or later 6. Restart hub after update

🔧 Temporary Workarounds

Disable JavaScript Interface

all

Temporarily disable JavaScript interface access to SmartThings API

Not applicable - configuration through SmartThings app

Network Segmentation

all

Isolate SmartThings hub on separate VLAN with restricted internet access

Configure firewall rules to restrict SmartThings hub network access

🧯 If You Can't Patch

  • Isolate SmartThings hub from internet and restrict network access to trusted devices only
  • Disable remote access features and use local-only SmartThings functionality

🔍 How to Verify

Check if Vulnerable:

Check SmartThings hub firmware version in app: Settings > About SmartThings Hub

Check Version:

Not applicable - version check through SmartThings mobile app only

Verify Fix Applied:

Confirm firmware version is 1.7.85.12 or higher in SmartThings app

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript API calls
  • Unauthorized access attempts to SmartThings API
  • Multiple failed authentication attempts

Network Indicators:

  • Unexpected outbound connections from SmartThings hub
  • Suspicious API requests to SmartThings endpoints

SIEM Query:

source="smartthings" AND (event_type="api_access" OR event_type="javascript_execution") AND status="unauthorized"

🔗 References

📤 Share & Export